COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following is the correct sequence of encryption ciphers from the weakest to the strongest?
|
DES > 3DES > Blowfish > AES
|
|
3DES > DES > Blowfish > AES
|
|
3DES > DES > AES > Blowfish
|
|
DES > Blowfish > AES > 3DES
|
Explanation:
Detailed explanation-1: -AES is the symmetric algorithm of choice for most applications today, and it is widely used, typically with 128 or 256-bit keys, the latter of which is considered strong enough to protect military TOP SECRET data.
Detailed explanation-2: -AES. The most commonly used symmetric algorithm is the Advanced Encryption Standard (AES), which was originally known as Rijndael. This is the standard set by the U.S. National Institute of Standards and Technology in 2001 for the encryption of electronic data announced in U.S. FIPS PUB 197.
Detailed explanation-3: -Encryption Algorithms are: DES (family), IDEA, RSA, Blowfish, Twofish, and AES.
There is 1 question to complete.